EP1695485B1 - Method for automatically classifying a set of alarms emitted by sensors for detecting intrusions of a information security system - Google Patents

Method for automatically classifying a set of alarms emitted by sensors for detecting intrusions of a information security system Download PDF

Info

Publication number
EP1695485B1
EP1695485B1 EP04816391A EP04816391A EP1695485B1 EP 1695485 B1 EP1695485 B1 EP 1695485B1 EP 04816391 A EP04816391 A EP 04816391A EP 04816391 A EP04816391 A EP 04816391A EP 1695485 B1 EP1695485 B1 EP 1695485B1
Authority
EP
European Patent Office
Prior art keywords
alert
alerts
node
trellis
general
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Not-in-force
Application number
EP04816391A
Other languages
German (de)
French (fr)
Other versions
EP1695485A2 (en
Inventor
Benjamin Morin
Hervé Debar
Elvis Tombini
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Orange SA
Original Assignee
France Telecom SA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by France Telecom SA filed Critical France Telecom SA
Priority to PL04816391T priority Critical patent/PL1695485T3/en
Publication of EP1695485A2 publication Critical patent/EP1695485A2/en
Application granted granted Critical
Publication of EP1695485B1 publication Critical patent/EP1695485B1/en
Not-in-force legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0631Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/085Payment architectures involving remote charge determination or related payment systems
    • G06Q20/0855Payment architectures involving remote charge determination or related payment systems involving a third party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0604Management of faults, events, alarms or notifications using filtering, e.g. reduction of information by using priority, element types, position or time
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/16Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection

Definitions

  • the invention relates to a method for automatic classification of a set of alerts from intrusion detection probes.
  • Information systems security requires the deployment of IDS intrusion detection systems with intrusion detection probes that issue alerts to alert management systems.
  • intrusion detection probes are active components of the intrusion detection system that analyze one or more data sources looking for events that are characteristic of intrusive activity and issue alerts to management systems.
  • An alert management system centralizes the alerts from the probes and possibly performs an analysis of all these alerts.
  • Intrusion detection probes generate a very large number of alerts that can include several thousand per day depending on configurations and the environment.
  • alerts can result from a combination of several phenomena. First, false alerts account for up to 90% of the total number of alerts. Then the alerts are often too granular, that is to say that their semantic content is very poor. Finally, alerts are often redundant and recurrent.
  • the upstream processing of alerts at the level of the management system is therefore necessary to facilitate the analysis work of a security operator.
  • This treatment consists in correlating the alerts, it's up to say to reduce the overall amount of alerts, while improving their semantics. This can be done by unsupervised classification of alerts.
  • the purpose of the unsupervised classification is to split the alert space into several classes taking into account the variables that characterize them.
  • Qualitative and structured variables are variables belonging to discrete domains each of which is provided with a partial order.
  • This method constructs a conceptual hierarchy from a set of data downwards, by determining a partition of a complete set of data into several disjoint classes.
  • Fisher's method is an incremental conceptual classification, which does not require prior knowledge of the number of classes desired. On the other hand, this method is used for nominal variables.
  • Fisher's approach produces a partition of all data.
  • the method used by Han consists in generalizing structured variables.
  • the domain of each variable has a partial order represented by a tree hierarchy, whose level of abstraction or generalization is increasing from the leaves to the top of the hierarchy.
  • Hall's method is iterative. Each iteration consists of choosing an attribute and generalizing the value of the attribute of each individual, according to the hierarchy associated with it. Variables that become equal after a generalization are merged. The overall number of variables therefore decreases with each iteration. The process stops when the number of variables falls below a given threshold.
  • This stopping criterion is not satisfactory because one can not know a priori how many groups of alerts it is desirable to present to the security operator.
  • the generalized alerts obtained may be over-generalized and their interest limited. The difficulty of the approach is therefore to find a good compromise between a significant reduction in the number of alerts and the maintenance of their relevance.
  • the change made by Julisch consists of removing from the set of alerts submitted to the generalization process any generalized alert whose number of underlying alert instances exceeds a given threshold.
  • EP-A-0985995 (IBM), March 15, 2000, discloses the preamble of claim 1.
  • the aim of the invention is to overcome these drawbacks, and to provide a simple method of unsupervised classification of alerts from intrusion detection probes to generate the most general and relevant synthetic alerts presenting a global vision of the set of alerts and fully automatically.
  • the method according to the invention is an incremental method and provides potentially non-disjoint alert classes.
  • a relevant alert is identified when each of the sets of child nodes of the relevant alert resulting from a specialization of this alert according to each of its attribute domains is homogeneous, and when the number of elements comprising said each set of child nodes of the relevant alert is greater than a threshold value.
  • the synthetic alerts are associated with different groups of alerts from the probes so that these groups are not necessarily mutually exclusive.
  • the plurality of attribute domains may include domains from the following sets: set of attack identifiers, set of attack sources, set of attack targets, and set of attack dates.
  • the invention is also directed to a computer program designed to implement the above method, when executed by the alert management system.
  • FIG. 1 illustrates an example of an intrusion detection system 1 connected through a router 3 to an external network 5 and to an internal network 7a and 7b with a distributed architecture.
  • the intrusion detection system 1 comprises several intrusion detection probes 11a, 11b, 11c, and an alert management system 13.
  • a first intrusion detection probe 11a monitors the alerts coming from the intrusion detection system 11. outside
  • a second probe 11b monitors a part of the internal network 7a comprising work 15
  • a third probe 11c monitors another part of the internal network 7b including servers 17 delivering information to the external network 5.
  • the alert management system 13 may comprise a host 19 dedicated to the processing of alerts, a database 21, and an output unit 23.
  • the probes 11a, 11b, 11c deployed in the intrusion detection system 1 send (arrows 26) their alerts 25 to the alert management system 13.
  • the latter in accordance with the invention, proceeds to an automatic classification. of this set of alerts and sends synthetic alerts to the output unit 23 to present a global view of all alerts from the intrusion detection probes 11a, 11b, 11c.
  • the host 19 of the warning management system 13 includes processing means for automatically sorting the alerts and storing this classification in the form of trellises in the database 21.
  • a computer program designed to implement the present invention can be executed by the alert management system.
  • the data that can be the object of a conceptual classification are n-tuples of attributes (a 1 , ... a i , ..., a n ) ⁇ A 1 ⁇ ⁇ ⁇ Ai ⁇ ⁇ ⁇ a n, Ai being a discrete set with a partial order relation ⁇ Ai defining the attribute field i.
  • each attribute value has at most one parent, and the distance of the leaves at the top of the tree is a constant.
  • the present invention can easily be adapted to more elaborate hierarchies.
  • a hierarchical structure can be considered as a tree structure where the ancestor of an element b is an element a such that b ⁇ Ai a.
  • the element a is more abstract or more general than the element b, and conversely, we say that the element b is more specific than the element a.
  • the element a is a direct ancestor of b if ( a, b ) ⁇ cov er ( ⁇ Ai ) , that is, if there is not an intermediate element g between the elements a and b, or formally if b ⁇ Ai a and ( ⁇ g / ( g ⁇ Ai a and b ⁇ Ai g )) .
  • a sheet f is an element f ⁇ Ai such that ⁇ g ⁇ A i such that g ⁇ Ai f .
  • Each attribute has a level of abstraction or generalization, defined by an integer corresponding to the height of the attribute in the hierarchical structure.
  • Level 0 is assigned to the root of the hierarchy, that is, to the most general set of elements.
  • the level of abstraction or generalization of any element is worth the level of abstraction of its direct ancestor increased by the value 1.
  • each alert can be defined by a plurality of qualitative attributes ( a 1 , ... a i , ... a n ) belonging to a plurality of attribute domains ( A 1 , ..., A 1 ,. ..An ) each of which has a partial order relationship.
  • each attribute domain Ai can therefore be organized into a hierarchical structure comprising several levels defined according to the partial order relation of the attribute domain. Then, the plurality of attribute domains ( A 1 , ..., Ai, ... An ) form several hierarchical structures.
  • alerts from the intrusion detection probes 11a, 11b, 11c can be considered as individuals that are the subject of the classification.
  • the objective of the classification according to the invention is to identify relevant concepts by performing successive generalizations on the attributes of the individuals, according to their partial order relationship.
  • the subset ⁇ Ai ( c ) of the set ⁇ ( c ) is the set of child nodes of c, resulting from the specialization of c according to the attribute domain Ai.
  • the subset ⁇ Ai ( c ) of the set ⁇ ( c ) is the set of parent nodes of c , resulting from the generalization of c according to the attribute domain Ai.
  • ⁇ Ai can be considered as a function when the hierarchical structure is a tree structure.
  • ⁇ ⁇ VS ⁇ VS vs 1 ⁇ vs 2 ⁇ ⁇ Have , vs 1 Have ⁇ ⁇ Have ⁇ vs 2 [ Have ] ⁇ aj , vs 1 aj ⁇ ⁇ Have ⁇ vs 2 [ aj ] , where c [ Ai ] designates the attribute belonging to the attribute domain Ai of the concept c .
  • This partial order relation ⁇ makes it possible to construct for each individual i , in particular for each alert resulting from the intrusion detection probes, a lattice specific to this alert by generalizing each alert according to each of its attributes and at all levels of detection. the hierarchical structure.
  • a general lattice containing all the concepts can be constructed by successive additions of clean lattices.
  • the insertion of an individual into the general lattice is done by fusing the lattice proper to the individual with the general lattice.
  • a clean mesh can be constructed for each alert from the intrusion detection probes 11a, 11b, 11c.
  • This clean lattice therefore comprises nodes corresponding to alerts, interconnected by arcs so that each node is linked to one or more parent nodes and / or one or more child or descendant nodes.
  • each of the clean lattices associated with the alerts from the intrusion detection probes may be iteratively fused into the general lattice.
  • synthetic warnings can be identified in the general lattice, by selecting the alerts that are both most relevant and general according to statistical criteria and according to the membership of their attributes at lower levels of the hierarchical structures.
  • Figures 2 to 4 show flowcharts illustrating the formation of the lattice specific to a given individual, the merger of a given lattice in the general lattice, and the selection of relevant and general concepts.
  • the steps E1 to E3 are a main loop that iterates over the attribute indices according to which the node given as parameter, at the step E0, will be generalized. Iteration is done for all the indices k between l and n and for all the attributes a k generalizable.
  • the function genAtt ( c, k ) is calculated in step E2 , which retrieves the value of the attribute that generalizes that of a k to form a concept p corresponding to the generalization of the concept c according to the index k .
  • Step E4 is a recursive call where the flowchart is applied for new parameters.
  • FIG. 2A shows an example of the construction of the own lattice 31 from a given alert corresponding to a given node A according to the second attribute of the node A.
  • the generalized value of this attribute is retrieved from its hierarchical structure to form a new alert that is more general than the alert given.
  • a new node D corresponding to the new alert formed according to the generalization of the second attribute of node A is added to the lattice and an arc (D, A ) from the new node D of the new alert to the node A of the given alert.
  • the parent nodes of the given alert come from the generalization of the alert given according to its other attributes.
  • the algorithm is re-executed recursively with parameters (D, 2, T).
  • the flowchart of FIG. 3 shows the fusion of a given clean lattice in the general lattice.
  • the main loop between the steps E11 and E14 or E15 iterates on the set of child nodes of the node h of the lattice clean passed in parameter, that is to say for h j ⁇ ⁇ ( h ) .
  • step E11 a child node h j of the first node h is chosen.
  • Step E15 is a recursive call where the flowchart is reapplied from step E11 but for new parameters.
  • the children of the node h j are not necessarily in the general lattice, so we must recursively execute the algorithm on this node h j .
  • FIGS. 3A and 3B show schematically the merging mechanism of a lattice specific to the general lattice, according to the flowchart of FIG. 3.
  • the left trellis portion belongs to the general trellis and the right trellis portion belongs to the trellis that one wishes to merge.
  • the node C does not exist as a child of A, then a link 47 (in dashed lines) is created between A and C, and the link 49 which links C to A 'is deleted.
  • the sub-lattice with vertex C is therefore integrated into the general lattice.
  • the algorithm is called with as arguments the vertices of the lattice specific to the individual to be inserted and the vertex of the general lattice. As all the lattices have the same vertex corresponding to the most general node, the assumption that the concepts passed in arguments to the algorithm are equal is respected.
  • the flowchart in Figure 4 shows the identification of synthetic alerts or concepts providing a set P of alerts or concepts that are both the most relevant and the most general of an alert or concept c .
  • An alert or concept c is relevant if each of the sets ⁇ Ai ( c ) is "homogeneous" and "sufficiently large”.
  • a set of alerts or concepts is homogeneous if the dispersion of the number of individuals covered by each concept is not too great. For this purpose, a coefficient of variation is used in a known manner.
  • a set ⁇ Ai ( c ) is sufficiently large if the number of elements that compose it is greater than a threshold value linked to the level of abstraction or generalization of the attribute Ai of c .
  • p vs ⁇ ⁇ Have , Have > ⁇ vs Have and ⁇ F Have m F Have ⁇ 1 where the function p ( c ) designates a Boolean function indicating whether a node is relevant; F Ai is the set of individuals covered by each concept of ⁇ Ai ( c ); m F Have is the average of F Ai ; ⁇ F Have its variance; and ⁇ c Have represents the threshold value related to the abstraction level of the attribute domain Ai of c.
  • the number of individuals covered by a concept is a value related to each node of the lattice and updated upon the merger of a clean lattice associated with an individual with the general lattice.
  • an alert is said to be relevant if each of the sets of child nodes of the relevant alert c resulting from the specialization of this alert c according to each of its attribute domains is homogeneous, and if the number of elements composing each of the sets child nodes of the relevant alert c is greater than a threshold value.
  • Step E20 of the flowchart of FIG. 4 corresponds to the definition of the call parameters.
  • the algorithm is applied recursively, at the steps E23 on all the children of c coming from the specialization of c according to the attributes of indexes i superior or equal to t, that is to say c i ⁇ ⁇ Ai ( c ), knowing that the other attributes have already been analyzed.
  • a list including the concepts considered relevant and general is provided to the output unit 23 of the warning management system 13 so that a security operator can have a global view of all alerts. If the latter wants details on any concept c that he deems too abstract, then the algorithm is re-executed on all the children of this concept c .
  • Figure 5 very schematically shows an alert associated with different synthetic alerts.
  • the A1 to A6 alerts issued by the intrusion detection probes are the sheets of the general lattice.
  • the alert group associated with a general alert is the set of sheets accessible from this general alert.
  • the alert group A123 is associated with the synthetic alert S1 and the alert group A34 is associated with the synthetic alert S2.
  • the A4 to A6 alerts are associated with an A7 general alert which is not a synthetic alert.
  • the groups of alerts are not mutually exclusive.
  • the alert A3 participates in two phenomena, that is to say two different groups of alerts A123 and A34.
  • Alerts from intrusion detection probes are individuals defined by a plurality of attributes belonging to a plurality of attribute domains. Attribute domains can include a set of alert identifiers, a set of attack sources, a set of attack targets, and a set of attack dates.
  • FIGS. 6A to 7 show a simplified example of classification of a set of alerts originating from intrusion detection probes.
  • the alerts are triplets ( name, src, dst ) ⁇ N ⁇ S ⁇ D, where N represents the set of the alert identifiers, S represents the set of attack sources, and D represents the set of attack targets.
  • the alerts could consist of other types of attributes, or the same but with domains defined differently.
  • the alert identifiers are the signature identifiers of the Snort TM intrusion detection tool.
  • the higher level of abstraction consists of the attack classes defined by Snort TM .
  • the higher level of abstraction consists of a single element, "any”.
  • Figure 6A shows a simplified hierarchy associated with the domain of the set of identifiers.
  • the first level of abstraction or generalization N11 includes the elements “att1" and “att2".
  • the second and third levels of generalization N12, N13 include the elements “web-attack” and "any” respectively.
  • IPv4 type addresses At the lowest abstraction level, the attack sources are IPv4 type addresses.
  • the higher level of abstraction consists of network domain names managed by the IANA TM organization and its local branches (RIPE, APNIC, ARIN, etc.). IP addresses not registered in the IANA TM database or public addresses internal to the monitored information system or private IP addresses, are abstracted in CIDR type notation (eg 192.168.0.0/24).
  • the upper level may consist of two elements, "external” and "internal” to designate the exterior and interior of the information system.
  • the next level of abstraction consists of a single element, "any”.
  • FIG. 6B shows a simplified hierarchy associated with the domain of the set of attack sources.
  • the first level of abstraction or generalization with the elements "192.168.0.1” and “192.168.0.33".
  • the second and third levels of generalization include the elements “internal” and "any” respectively.
  • attack targets are the public and private IP addresses of the information system.
  • the next level of abstraction is network addresses in CIDR notation.
  • the next level of abstraction consists of a single element, "any”.
  • Figure 6C shows a simplified hierarchy associated with the domain of the set of attack targets.
  • the first, second and Third levels of abstraction or generalization include the elements "192.168.0.10", “proxy”, and "any” respectively.
  • Figure 7 illustrates a general lattice associated with two A1 and A2 alerts defined by A1 (att2, 192.168.0.1, 192.168.0.10) and A2 (att1, 192.168.0.33, 192.168.0.10).
  • the attack identifiers are generalized to the attack class "web-attack” and then to "any".
  • IP addresses of attackers are generalized to “internal” then “any”.
  • IP addresses of the victims are generalized according to "proxy" host, then to "any”.
  • the most abstract alert inferred by the system is (any, any, any).
  • the full arrows denote a generalization according to the attribute that corresponds to the attack
  • the arrows in dashes denote a generalization according to the attribute that corresponds to the attacker
  • the dashed arrows denote a generalization according to the attribute that corresponds to the victim.
  • the system proposes the synthetic alert (web-attack, internal, proxy). Other alerts are either too general or too specific.

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Accounting & Taxation (AREA)
  • Software Systems (AREA)
  • Finance (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Databases & Information Systems (AREA)
  • Evolutionary Computation (AREA)
  • Medical Informatics (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Artificial Intelligence (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Alarm Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Burglar Alarm Systems (AREA)

Abstract

The process involves organizing attributes of each attribute domain into a hierarchical structure comprising several levels. A lattice is constructed for each alarm originated from intrusion sensing probes (11a-11c) according to the structure. The lattices are iteratively merged to form a general lattice. Alarms that are pertinent and general are identified to produce synthetic alarms for an output unit of an alarm management system. An independent claim is also included for a computer program implementing a process for classifying alarm sets.

Description

Arrière-plan de l'inventionBackground of the invention

L'invention concerne un procédé de classification automatique d'un ensemble d'alertes issues de sondes de détection d'intrusions.The invention relates to a method for automatic classification of a set of alerts from intrusion detection probes.

La sécurité des systèmes d'information passe par le déploiement de systèmes de détection d'intrusions « IDS » comportant des sondes de détection d'intrusions qui émettent des alertes vers des systèmes de gestion d'alertes.Information systems security requires the deployment of IDS intrusion detection systems with intrusion detection probes that issue alerts to alert management systems.

En effet, les sondes de détection d'intrusions sont des composants actifs du système de détection d'intrusions qui analysent une ou plusieurs sources de données à la recherche d'événements caractéristiques d'une activité intrusive et émettent des alertes vers les systèmes de gestion d'alertes. Un système de gestion des alertes centralise les alertes provenant des sondes et effectue éventuellement une analyse de l'ensemble de ces alertes.Indeed, intrusion detection probes are active components of the intrusion detection system that analyze one or more data sources looking for events that are characteristic of intrusive activity and issue alerts to management systems. alert. An alert management system centralizes the alerts from the probes and possibly performs an analysis of all these alerts.

Les sondes de détection d'intrusions génèrent un très grand nombre d'alertes qui peut comprendre plusieurs milliers par jour en fonction des configurations et de l'environnement.Intrusion detection probes generate a very large number of alerts that can include several thousand per day depending on configurations and the environment.

L'excès d'alertes peut résulter d'une combinaison de plusieurs phénomènes. Tout d'abord, des fausses alertes représentent jusqu'à 90% du nombre total d'alertes. Ensuite, les alertes sont souvent trop granulaires, c'est-à-dire que leur contenu sémantique est très pauvre. Enfin les alertes sont souvent redondantes et récurrentes.Excess alerts can result from a combination of several phenomena. First, false alerts account for up to 90% of the total number of alerts. Then the alerts are often too granular, that is to say that their semantic content is very poor. Finally, alerts are often redundant and recurrent.

Le traitement amont des alertes au niveau du système de gestion est donc nécessaire pour faciliter le travail d'analyse d'un opérateur de sécurité. Ce traitement consiste à corréler les alertes, c'est à dire à réduire la quantité globale des alertes, tout en améliorant leur sémantique. Ceci peut être fait par une classification non supervisée des alertes.The upstream processing of alerts at the level of the management system is therefore necessary to facilitate the analysis work of a security operator. This treatment consists in correlating the alerts, it's up to say to reduce the overall amount of alerts, while improving their semantics. This can be done by unsupervised classification of alerts.

L'objectif de la classification non supervisée est de découper l'espace des alertes en plusieurs classes en tenant compte des variables qui les caractérisent.The purpose of the unsupervised classification is to split the alert space into several classes taking into account the variables that characterize them.

Dans le présent domaine d'application, les alertes qui font l'objet de la classification sont décrites par des variables essentiellement qualitatives et structurées.In this field of application, the alerts that are the subject of the classification are described by essentially qualitative and structured variables.

Les variables qualitatives et structurées sont des variables appartenant à des domaines discrets dont chacun est muni d'un ordre partiel.Qualitative and structured variables are variables belonging to discrete domains each of which is provided with a partial order.

Les méthodes de classification des variables qualitatives structurées sont dites des classifications conceptuelles.Classification methods for structured qualitative variables are called conceptual classifications.

Une méthode de classification conceptuelle est proposée par R.S. Michalsky et R.E. Stepp, dans une publication intitulée "Learning from Observation: Conceptual Clustering", dans le journal "In Machine Learning: An, Artificial Intelligence Approach", publié en 1993.A conceptual classification method is proposed by R.S. Michalsky and R.E. Stepp, in a publication entitled "Learning from Observation: Conceptual Clustering", in the journal "In Machine Learning: An, Artificial Intelligence Approach", published in 1993.

Cette méthode construit de manière descendante une hiérarchie conceptuelle à partir d'un ensemble de données, en déterminant une partition d'un ensemble complet de données en plusieurs classes disjointes.This method constructs a conceptual hierarchy from a set of data downwards, by determining a partition of a complete set of data into several disjoint classes.

L'approche utilisée dans cette méthode de Michalsky est donc inadaptée à la classification des alertes, puisqu'elle partitionne l'ensemble des données et est incapable d'intégrer une nouvelle donnée sans avoir à être réinitialisée.The approach used in this method of Michalsky is therefore unsuited to the classification of alerts, since it partitions all the data and is unable to integrate new data without having to be reset.

En effet, les bases de données des alertes sont fortement dynamiques car il peut y avoir plusieurs nouvelles alertes par seconde.Indeed, the databases of alerts are highly dynamic because there can be several new alerts per second.

Une autre méthode de classification conceptuelle est proposée par D.H. Fisher, dans une publication d'une thèse de doctorat, intitulée "Knowledge Acquisition via Incremental Conceptual Clustering", au «Department of Information and Computer Science, University of California », publiée en 1987.Another conceptual classification method is proposed by DH Fisher, in a publication of a doctoral thesis entitled "Knowledge Acquisition via Incremental Conceptual Clustering", Department of Information and Computer Science, University of California, 1987.

La méthode de Fisher est une classification conceptuelle incrémentale, qui ne nécessite pas une connaissance préalable du nombre de classes souhaitées. En revanche, cette méthode est utilisée pour des variables nominales.Fisher's method is an incremental conceptual classification, which does not require prior knowledge of the number of classes desired. On the other hand, this method is used for nominal variables.

D'autres méthodes dérivées de la méthode de Fisher prennent en charge des données structurées. La structure de la hiérarchie obtenue par ces méthodes est fortement dépendante de l'ordre d'insertion des données. De plus, l'approche de Fisher produit une partition de l'ensemble des données.Other methods derived from the Fisher method support structured data. The structure of the hierarchy obtained by these methods is strongly dependent on the order of insertion of the data. In addition, Fisher's approach produces a partition of all data.

Par ailleurs, Manganaris et al, dans une publication au « 2nd International Workshop on Recent Advances in Intrusion Detection 1999», intitulée "A Data Mining Analysis of RTID Alarms", proposent de modéliser un comportement toléré d'un système d'information à l'aide des alertes fournies par les outils de détection d'intrusions. L'utilisation des systèmes de détection d'intrusions « IDS » en milieu opérationnel montre en effet que les alertes les moins fréquentes sont généralement les plus suspectes.Moreover, Manganaris et al, in a publication at the 2nd International Workshop on Recent Advances in Intrusion Detection 1999, entitled "A Data Mining Analysis of RTID Alarms", propose to model a tolerated behavior of an information system to the help alerts provided by intrusion detection tools. The use of "IDS" intrusion detection systems in an operational environment shows that the less frequent alerts are generally the most suspicious.

Selon ce modèle, les alertes récurrentes sont considérées comme étant soit des fausses alertes dues au comportement normal d'entités du système d'information, mais qui semble intrusif du point de vue des systèmes IDS, soit des défaillances des entités.According to this model, recurring alerts are considered to be either false alerts due to the normal behavior of information system entities, but which seems intrusive from the point of view of IDS systems, that is entity failures.

Une autre méthode de classification d'alertes est proposée par K. Julisch, dans une publication de « Proceedings of the 17th ACSAC » en 2001, intitulée "Mining Alarm Clusters to Improve Alarm Handling Efficiency". Cette méthode propose une généralisation des alertes pour mettre en évidence des groupes d'alertes plus pertinents que chaque alerte prise individuellement.Another method of alert classification is proposed by K. Julisch, in a publication of "Proceedings of the 17th ACSAC" in 2001, entitled "Mining Alarm Clusters to Improve Alarm Handling Efficiency". This method proposes a generalization of alerts to highlight groups of alerts more relevant than each alert taken individually.

La méthode utilisée par Julisch est une modification d'une autre méthode connue proposée par Han et al, publiée dans « Advances in Knowledge Discovery and Data Mining, AAAI Press » en 1996 sous le titre "Exploration of the Power of Attribute-Oriented Induction in Data-Mining". /Mit Press, 1996.The method used by Julisch is a modification of another known method proposed by Han et al, published in "Advances in Knowledge Discovery and Data Mining, AAAI Press" in 1996 under the title "Exploration of the Power of Attribute-Oriented Induction". Data mining ". / Mit Press, 1996.

Sommairement, la méthode utilisée par Han consiste à généraliser des variables structurées. Le domaine de chaque variable possède un ordre partiel représenté par une hiérarchie arborescente, dont le niveau d'abstraction ou généralisation va croissant des feuilles au sommet de la hiérarchie.Briefly, the method used by Han consists in generalizing structured variables. The domain of each variable has a partial order represented by a tree hierarchy, whose level of abstraction or generalization is increasing from the leaves to the top of the hierarchy.

La méthode de Hall est itérative. Chaque itération consiste à choisir un attribut et à généraliser la valeur de l'attribut de chaque individu, en fonction de la hiérarchie qui lui est associée. Les variables qui deviennent égales, suite à une généralisation, sont fusionnées. Le nombre global de variables décroît donc à chaque itération. Le processus s'arrête lorsque le nombre de variables devient inférieur à un seuil donné.Hall's method is iterative. Each iteration consists of choosing an attribute and generalizing the value of the attribute of each individual, according to the hierarchy associated with it. Variables that become equal after a generalization are merged. The overall number of variables therefore decreases with each iteration. The process stops when the number of variables falls below a given threshold.

Ce critère d'arrêt n'est pas satisfaisant car on ne peut pas savoir à priori combien de groupes d'alertes il est souhaitable de présenter à l'opérateur de sécurité. De plus, les alertes généralisées obtenues risquent d'être sur-généralisées et leur intérêt limité. La difficulté de l'approche consiste donc à trouver un bon compromis entre une réduction importante du nombre d'alertes et le maintien de leur pertinence.This stopping criterion is not satisfactory because one can not know a priori how many groups of alerts it is desirable to present to the security operator. In addition, the generalized alerts obtained may be over-generalized and their interest limited. The difficulty of the approach is therefore to find a good compromise between a significant reduction in the number of alerts and the maintenance of their relevance.

Alors, la modification apportée par Julisch consiste à retirer de l'ensemble d'alertes soumises au processus de généralisation toute alerte généralisée dont le nombre d'instances d'alertes sous-jacentes dépasse un seuil donné.So, the change made by Julisch consists of removing from the set of alerts submitted to the generalization process any generalized alert whose number of underlying alert instances exceeds a given threshold.

Afin d'éviter le phénomène de sur-généralisation, la généralisation effectuée sur les alertes généralisées restantes est annulée, et le processus est réitéré avec un autre attribut.In order to avoid the over-generalization phenomenon, the generalization performed on the remaining generalized alerts is canceled, and the process is reiterated with another attribute.

L'inconvénient de cette méthode est qu'elle ne permet pas d'identifier des généralisations pertinentes qui auraient pu se présenter si les alertes fournies à l'opérateur de sécurité avaient été conservées pour les généralisations suivantes. De plus, la nature des alertes généralisées obtenues dépend de l'ordre des attributs qui est basé sur des heuristiques.The disadvantage of this method is that it does not identify relevant generalizations that might have occurred if the alerts provided to the security operator had been retained for the following generalizations. In addition, the nature of the generalized alerts obtained depends on the order of attributes that is based on heuristics.

Enfin, la méthode de Julisch n'est pas incrémentale et le processus de généralisation doit être réinitialisé à chaque requête de l'opérateur de sécurité.Finally, the Julisch method is not incremental and the generalization process must be reset each time the security operator requests.

Le document EP-A-0985995 (IBM), 15 MARS 2000, divulgue le préambule de la revendication 1.EP-A-0985995 (IBM), March 15, 2000, discloses the preamble of claim 1.

Objet et résumé de l'inventionObject and summary of the invention

L'invention a pour but de remédier à ces inconvénients, et de fournir une méthode simple de classification non supervisée des alertes issues de sondes de détection d'intrusions pour engendrer des alertes synthétiques les plus générales et les plus pertinentes présentant une vision globale de l'ensemble des alertes et de façon entièrement automatique.The aim of the invention is to overcome these drawbacks, and to provide a simple method of unsupervised classification of alerts from intrusion detection probes to generate the most general and relevant synthetic alerts presenting a global vision of the set of alerts and fully automatically.

Ces buts sont atteints grâce à un procédé de classification automatique d'un ensemble d'alertes issues de sondes de détection d'intrusions d'un système de sécurité d'information pour produire des alertes synthétiques, chaque alerte étant définie par une pluralité d'attributs qualitatifs appartenant à une pluralité de domaines d'attributs dont chacun est muni d'une relation d'ordre partiel, caractérisé en ce qu'il comporte les étapes suivantes :

  • organiser les attributs appartenant à chaque domaine d'attribut en une structure hiérarchique comportant plusieurs niveaux définis selon la relation d'ordre partiel du domaine d'attribut, la pluralité de domaines d'attributs formant ainsi plusieurs structures hiérarchiques ;
  • construire pour chaque alerte issue des sondes de détection d'intrusions, un treillis propre à cette alerte en généralisant chaque alerte selon chacun de ses attributs et à tous les niveaux de la structure hiérarchique, le treillis propre comportant des noeuds correspondant à des alertes, liés entre eux par des arcs de sorte que chaque noeud est lié à un ou des noeuds parents et/ou un ou des noeuds enfants ou descendants ;
  • fusionner de façon itérative dans un treillis général, chacun des treillis propres ;
  • identifier dans le treillis général, les alertes synthétiques en sélectionnant les alertes qui sont à la fois les plus pertinentes et les plus générales selon des critères statistiques et selon l'appartenance de leurs attributs à des niveaux inférieurs des structures hiérarchiques; et
  • produire les alertes synthétiques à une unité de sortie d'un système de gestion d'alertes afin de présenter une vision globale de l'ensemble des alertes issues des sondes de détection d'intrusions.
These goals are achieved through a method of automatically classifying a set of alerts from intrusion detection probes of an information security system to produce synthetic alerts, each alert being defined by a plurality of alerts. qualitative attributes belonging to a plurality of attribute domains each of which is provided with a partial order relationship, characterized in that it comprises the following steps:
  • arranging the attributes belonging to each attribute domain into a hierarchical structure having a plurality of levels defined according to the partial order relationship of the attribute domain, the plurality of attribute domains thereby forming a plurality of hierarchical structures;
  • construct for each alert issued by the intrusion detection probes, a lattice specific to this alert by generalizing each alert according to each of its attributes and at all levels of the hierarchical structure, the trellis own node having nodes corresponding to alerts, interconnected by arcs so that each node is linked to one or more parent nodes and / or one or more child nodes or descendants;
  • iteratively merge into a general lattice, each of the lattices clean;
  • identify synthetic warnings in the general lattice by selecting the alerts that are both the most relevant and the most general according to statistical criteria and according to the membership of their attributes at lower levels of the hierarchical structures; and
  • produce synthetic alerts to an output unit of an alert management system in order to present a global view of all alerts from intrusion detection probes.

Ainsi, la méthode selon l'invention est une méthode incrémentale et fournit des classes d'alertes potentiellement non disjointes.Thus, the method according to the invention is an incremental method and provides potentially non-disjoint alert classes.

Selon un premier aspect de l'invention, la construction d'un treillis propre comporte les étapes suivantes :

  • récupérer pour tout attribut généralisable d'une alerte donnée, la valeur généralisée de cet attribut à partir de sa structure hiérarchique pour former une nouvelle alerte plus générale que ladite alerte donnée;
  • ajouter un nouveau noeud au treillis propre correspondant à la nouvelle alerte et ajouter un arc allant du nouveau noeud de la nouvelle alerte au noeud de l'alerte donnée ;
  • ajouter des arcs manquants allant des noeuds parents de l'alerte donnée, issus de la généralisation de l'alerte donnée selon ses autres attributs, au noeud de la nouvelle alerte.
According to a first aspect of the invention, the construction of a clean lattice comprises the following steps:
  • retrieve for any generalizable attribute of a given alert, the generalized value of this attribute from its hierarchical structure to form a new alert more general than said given alert;
  • add a new node to the clean mesh corresponding to the new alert and add an arc from the new node of the new alert to the node of the given alert;
  • add missing arcs from parent nodes of the given alert, resulting from the generalization of the alert given according to its other attributes, to the node of the new alert.

Selon un deuxième aspect de l'invention, la fusion d'un treillis propre donné dans le treillis général comporte les étapes suivantes :

  • sélectionner un premier noeud correspondant à une première alerte appartenant au treillis propre donné, et un second noeud correspondant à une seconde alerte appartenant au treillis général ;
  • supprimer tous les arcs provenant des noeuds parents d'un noeud enfant du premier noeud si ledit noeud enfant appartient aussi au treillis général,
  • ajouter au treillis général ledit noeud enfant et l'ensemble de ses descendants si ledit noeud enfant n'appartient pas au treillis général.
According to a second aspect of the invention, the fusion of a given clean lattice in the general lattice comprises the following steps:
  • selecting a first node corresponding to a first alert belonging to the given clean lattice, and a second node corresponding to a second alert belonging to the general lattice;
  • delete all the arcs from the parent nodes of a child node of the first node if the child node also belongs to the general lattice,
  • add to the general lattice said child node and all of its descendants if said child node does not belong to the general lattice.

Selon un troisième aspect de l'invention, une alerte pertinente est identifiée lorsque chacun des ensembles des noeuds enfants de l'alerte pertinente issu d'une spécialisation de cette alerte selon chacun de ses domaines d'attributs est homogène, et lorsque le nombre d'éléments composant ledit chacun des ensembles des noeuds enfants de l'alerte pertinente est supérieur à une valeur seuil.According to a third aspect of the invention, a relevant alert is identified when each of the sets of child nodes of the relevant alert resulting from a specialization of this alert according to each of its attribute domains is homogeneous, and when the number of elements comprising said each set of child nodes of the relevant alert is greater than a threshold value.

Avantageusement, les alertes synthétiques sont associées à des différents groupes d'alertes issus des sondes de sorte que ces groupes ne sont pas forcément mutuellement exclusifs.Advantageously, the synthetic alerts are associated with different groups of alerts from the probes so that these groups are not necessarily mutually exclusive.

La pluralité des domaines d'attributs peuvent comporter des domaines parmi les ensembles suivants : ensemble des identifiants d'attaques, ensemble des sources d'attaques, ensemble des cibles d'attaques, et ensemble des dates d'attaques.The plurality of attribute domains may include domains from the following sets: set of attack identifiers, set of attack sources, set of attack targets, and set of attack dates.

L'invention vise aussi un programme informatique conçu pour mettre en oeuvre le procédé ci-dessus, lorsqu'il est exécuté par le système de gestion d'alerte.The invention is also directed to a computer program designed to implement the above method, when executed by the alert management system.

Brève description des dessinsBrief description of the drawings

D'autres particularités et avantages de l'invention ressortiront à la lecture de la description faite, ci-après, à titre indicatif mais non limitatif, en référence aux dessins annexés, sur lesquels :

  • la figure 1 est une vue très schématique d'un système de sécurité d'information comportant un système de gestion d'alertes selon l'invention ;
  • la figure 2 est un organigramme de formation d'un treillis propre selon l'invention ;
  • la figure 2A montre très schématiquement le mécanisme de la figure 2 ;
  • la figure 3 est un organigramme de fusion d'un treillis propre dans un treillis général selon l'invention ;
  • les figures 3A et 3B montrent très schématiquement le mécanisme de la figure 3 ;
  • la figure 4 est un organigramme de sélection des alertes synthétiques selon l'invention ;
  • la figure 5 montre de façon très schématique une alerte associée à différentes alertes synthétiques selon l'invention ;
  • les figures 6A à 6C montrent très schématiquement des hiérarchies simplifiées associées aux différents domaines d'attributs des alertes selon l'invention ; et
  • la figure 7 illustre un treillis général associé à deux alertes généralisées selon les hiérarchies des figures 6A à 6C.
Other features and advantages of the invention will appear on reading the description given below, by way of indication but not limitation, with reference to the accompanying drawings, in which:
  • FIG. 1 is a very schematic view of an information security system comprising an alert management system according to the invention;
  • Figure 2 is a flow chart for forming a clean mesh according to the invention;
  • Figure 2A shows very schematically the mechanism of Figure 2;
  • FIG. 3 is a flow diagram of the fusion of a clean lattice in a general lattice according to the invention;
  • FIGS. 3A and 3B show very schematically the mechanism of FIG. 3;
  • FIG. 4 is a selection flow chart of the synthetic alerts according to the invention;
  • FIG. 5 very schematically shows an alert associated with different synthetic alerts according to the invention;
  • FIGS. 6A to 6C show very schematically simplified hierarchies associated with the various attribute domains of the alerts according to the invention; and
  • FIG. 7 illustrates a general lattice associated with two generalized alerts according to the hierarchies of FIGS. 6A to 6C.

Description détaillée de modes de réalisationDetailed description of embodiments

La figure 1 illustre un exemple d'un système de détection d'intrusions 1 relié au travers un routeur 3 à un réseau externe 5 et à un réseau interne 7a et 7b à architecture distribuée.FIG. 1 illustrates an example of an intrusion detection system 1 connected through a router 3 to an external network 5 and to an internal network 7a and 7b with a distributed architecture.

Le système de détection d'intrusions 1 comporte plusieurs sondes de détection d'intrusions 11a, 11b, 11c, et un système de gestion d'alertes 13. Ainsi, une première sonde 11a de détection d'intrusions surveille les alertes venant de l'extérieur, une deuxième sonde 11b surveille une partie du réseau interne 7a comprenant des stations de travail 15 et un troisième sonde 11c surveille une autre partie du réseau interne 7b comprenant des serveurs 17 délivrant des informations au réseau externe 5.The intrusion detection system 1 comprises several intrusion detection probes 11a, 11b, 11c, and an alert management system 13. Thus, a first intrusion detection probe 11a monitors the alerts coming from the intrusion detection system 11. outside, a second probe 11b monitors a part of the internal network 7a comprising work 15 and a third probe 11c monitors another part of the internal network 7b including servers 17 delivering information to the external network 5.

Le système de gestion d'alerte 13 peut comporter un hôte 19 dédié au traitement des alertes, une base de données 21, et une unité de sortie 23.The alert management system 13 may comprise a host 19 dedicated to the processing of alerts, a database 21, and an output unit 23.

Ainsi, les sondes 11a, 11b, 11c déployées dans le système de détection d'intrusions 1 envoient (flèches 26) leurs alertes 25 au système de gestion d'alerte 13. Ce dernier, conformément à l'invention, procède à une classification automatique de cet ensemble d'alertes et envoie des alertes synthétiques à l'unité de sortie 23 afin de présenter une vision globale de l'ensemble des alertes issues des sondes de détection d'intrusions 11a, 11b, 11c.Thus, the probes 11a, 11b, 11c deployed in the intrusion detection system 1 send (arrows 26) their alerts 25 to the alert management system 13. The latter, in accordance with the invention, proceeds to an automatic classification. of this set of alerts and sends synthetic alerts to the output unit 23 to present a global view of all alerts from the intrusion detection probes 11a, 11b, 11c.

En effet, l'hôte 19 du système de gestion d'alerte 13 comprend des moyens de traitement pour procéder à la classification automatique des alertes et le stockage de cette classification sous forme de treillis dans la base de données 21.Indeed, the host 19 of the warning management system 13 includes processing means for automatically sorting the alerts and storing this classification in the form of trellises in the database 21.

Ainsi, un programme informatique conçu pour mettre en oeuvre la présente invention peut être exécuté par le système de gestion d'alertes.Thus, a computer program designed to implement the present invention can be executed by the alert management system.

Les alertes et d'une manière générale, les données qui peuvent faire l'objet d'une classification conceptuelle sont des n-uplets d'attributs (a 1 ,...ai,...,an)A 1 × ··· ×Ai× ··· ×An, Ai étant un ensemble discret muni d'une relation d'ordre partiel ≺ Ai définissant le domaine de l'attribut ai. Alerts and in a general way, the data that can be the object of a conceptual classification are n-tuples of attributes (a 1 , ... a i , ..., a n )A 1 × ··· × Ai × ··· × a n, Ai being a discrete set with a partial order relation ≺ Ai defining the attribute field i.

Les ensembles partiellement ordonnés peuvent être représentés par un diagramme de Hasse, c'est à dire par un graphe acyclique dirigé ou une structure hiérarchique G=(Ai, cover(≺ Ai )) dont l'ensemble des noeuds est constitué des éléments de Ai et l'ensemble des arcs est constitué par la couverture de la relation d'ordre partiel.The partially ordered sets can be represented by a Hasse diagram, ie by a directed acyclic graph or a hierarchical structure G = ( A i , cov er (≺ Ai )) whose set of nodes consists of the elements of Ai and the set of arcs is constituted by the cover of the relation of partial order.

Dans le présent mode de réalisation, nous restreignons les hiérarchies d'attributs à des arbres équilibrés : chaque valeur d'attribut a au plus un seul parent et la distance des feuilles au sommet de l'arborescence est une constante. Toutefois, la présente invention peut être facilement adaptée à des hiérarchies plus élaborées.In the present embodiment, we restrict the attribute hierarchies to balanced trees: each attribute value has at most one parent, and the distance of the leaves at the top of the tree is a constant. However, the present invention can easily be adapted to more elaborate hierarchies.

Une structure hiérarchique peut être considérée comme une structure arborescente où l'ancêtre d'un élément b est un élément a tel que b ≺ Ai a. Dans ce cas on dit que l'élément a est plus abstrait ou plus général que l'élément b, et réciproquement, on dit que l'élément b est plus spécifique que l'élément a. A hierarchical structure can be considered as a tree structure where the ancestor of an element b is an element a such that b ≺ Ai a. In this case we say that the element a is more abstract or more general than the element b, and conversely, we say that the element b is more specific than the element a.

En particulier, l'élément a est un ancêtre direct de b si (a,b)∈ cover(Ai ), c'est-à-dire, s'il n'existe pas un élément intermédiaire g entre les éléments a et b, ou de façon formelle si b ≺Ai a et (∄g/(g ≺Ai a et b ≺Ai g)). In particular, the element a is a direct ancestor of b if ( a, b ) ∈ cov er ( Ai ) , that is, if there is not an intermediate element g between the elements a and b, or formally if b ≺ Ai a and (∄ g / ( g ≺ Ai a and b ≺ Ai g )) .

Les éléments les plus spécifiques d'un domaine d'attribut Ai, formant une structure hiérarchique, définissent ce qu'on appelle les feuilles de cette structure hiérarchique. Ainsi, une feuille f est un élément f ∈ Ai tel que ∄gAi tel que g Ai f.The most specific elements of an attribute domain Ai, forming a hierarchical structure, define what are called the leaves of this hierarchical structure. Thus, a sheet f is an element f ∈ Ai such that ∄ gA i such that g Ai f .

Chaque attribut possède un niveau d'abstraction ou de généralisation, défini par un entier correspondant à la hauteur de l'attribut dans la structure hiérarchique. Le niveau 0 est attribué à la racine de la hiérarchie, c'est-à-dire à l'ensemble d'éléments le plus général. Le niveau d'abstraction ou de généralisation d'un élément quelconque vaut le niveau d'abstraction de son ancêtre direct augmenté de la valeur 1.Each attribute has a level of abstraction or generalization, defined by an integer corresponding to the height of the attribute in the hierarchical structure. Level 0 is assigned to the root of the hierarchy, that is, to the most general set of elements. The level of abstraction or generalization of any element is worth the level of abstraction of its direct ancestor increased by the value 1.

Ainsi, chaque alerte peut être définie par une pluralité d'attributs qualitatifs (a 1 ,...ai,...an ) appartenant à une pluralité de domaines d'attributs (A1,..., Ai,...An) dont chacun est muni d'une relation d'ordre partiel.Thus, each alert can be defined by a plurality of qualitative attributes ( a 1 , ... a i , ... a n ) belonging to a plurality of attribute domains ( A 1 , ..., A 1 ,. ..An ) each of which has a partial order relationship.

Les attributs appartenant à chaque domaine d'attribut Ai peuvent donc être organisés en une structure hiérarchique comportant plusieurs niveaux définis selon la relation d'ordre partiel du domaine d'attribut. Alors, la pluralité de domaines d'attributs (A1,...,Ai,...An) forme plusieurs structures hiérarchiques.The attributes belonging to each attribute domain Ai can therefore be organized into a hierarchical structure comprising several levels defined according to the partial order relation of the attribute domain. Then, the plurality of attribute domains ( A 1 , ..., Ai, ... An ) form several hierarchical structures.

D'une manière générale, on parlera de « concept » pour désigner un élément quelconque de A1×...×An. En outre, les concepts non généralisés, c'est-à-dire les concepts dont les attributs n'appartiennent qu'aux feuilles des hiérarchies sont appelés des « individus ». Ainsi, les alertes issues des sondes de détection d'intrusions 11a, 11b, 11c peuvent être considérées comme des individus qui font l'objet de la classification.Generally, we will speak of "concept" to designate any element of A 1 × ... × An. In addition, the non-generalized concepts, that is to say the concepts whose attributes do not belong that leaves of hierarchies are called "individuals". Thus, alerts from the intrusion detection probes 11a, 11b, 11c can be considered as individuals that are the subject of the classification.

L'objectif de la classification selon l'invention est d'identifier des concepts pertinents en effectuant des généralisations successives sur les attributs des individus, en fonction de leur relation d'ordre partiel.The objective of the classification according to the invention is to identify relevant concepts by performing successive generalizations on the attributes of the individuals, according to their partial order relationship.

Les concepts à classifier sont structurés dans un treillis T=(C, R) où RC×C, et C est l'ensemble des noeuds du treillis correspondant aux concepts. Ainsi, dans un treillis la notion de concept peut être confondue avec celle du noeud.The concepts to be classified are structured in a lattice T = ( C, R ) where RC × C , and C is the set of nodes of the lattice corresponding to the concepts. Thus, in a lattice the notion of concept can be confused with that of the node.

Il existe un lien (c1,c2 )∈ R du noeud c 1 vers le noeud c 2 si c 1 est issu de l'abstraction ou de la généralisation de c 2 selon n'importe quel attribut. On note ↑ (c 1)={c 2 ∈C/(c 2 ,c 1)∈R} l'ensemble des noeuds parents du noeud c 1. De même, on note ↓ (c 1)={c 2C/(c 1,c 2)∈R} l'ensemble des noeuds enfants de c 1.There is a link ( c 1 , c 2 ) ∈ R from node c 1 to node c 2 if c 1 is derived from the abstraction or generalization of c 2 according to any attribute. We denote ↑ ( c 1 ) = { c 2 ∈C / ( c 2 , c 1 ) ∈R } the set of parent nodes of the node c 1 . Similarly, we denote ↓ ( c 1 ) = { c 2C / ( c 1 , c 2 ) ∈ R } the set of child nodes of c 1 .

Le sous-ensemble ↓ Ai (c) de l'ensemble ↓(c) est l'ensemble des noeuds enfants de c, issus de la spécialisation de c selon le domaine d'attribut Ai. The subset ↓ Ai ( c ) of the set ↓ ( c ) is the set of child nodes of c, resulting from the specialization of c according to the attribute domain Ai.

De même, le sous-ensemble ↑ Ai (c) de l'ensemble ↑ (c) est l'ensemble des noeuds parents de c, issus de la généralisation de c selon le domaine d'attribut Ai. Similarly, the subset ↑ Ai ( c ) of the set ↑ ( c ) is the set of parent nodes of c , resulting from the generalization of c according to the attribute domain Ai.

On notera que la relation ↓ Ai peut être considérée comme une fonction lorsque la structure hiérarchique est une structure arborescente.Note that the relation ↓ Ai can be considered as a function when the hierarchical structure is a tree structure.

Ainsi, on peut définir une relation d'ordre partiel ◁ sur l'ensemble des concepts de la manière suivante : C C : c 1 c 2 Ai , c 1 Ai Ai c 2 [ Ai ] Aj , c 1 Aj Ai c 2 [ Aj ] ,

Figure imgb0001

c[Ai] désigne l'attribut appartenant au domaine d'attribut Ai du concept c.Thus, we can define a partial order relation ◁ on the set of concepts in the following way: VS VS : vs 1 vs 2 Have , vs 1 Have Have vs 2 [ Have ] aj , vs 1 aj Have vs 2 [ aj ] ,
Figure imgb0001

where c [ Ai ] designates the attribute belonging to the attribute domain Ai of the concept c .

Cette relation d'ordre partiel ◁ permet de construire pour chaque individu i, en particulier pour chaque alerte issue des sondes de détection d'intrusions, un treillis propre à cette alerte en généralisant chaque alerte selon chacun de ses attributs et à tous les niveaux de la structure hiérarchique.This partial order relation ◁ makes it possible to construct for each individual i , in particular for each alert resulting from the intrusion detection probes, a lattice specific to this alert by generalizing each alert according to each of its attributes and at all levels of detection. the hierarchical structure.

Formellement, si i =(a 1,...,an ) est un individu, le treillis propre Ti = (Ci, Ri) associé à l'individu i est défini de la manière suivante: Ci = c 1 , c n A 1 × An / a j c j Aj

Figure imgb0002
Ri = c j c k Ci × Ci / ! Al / c j Al , c k Al cover Al Am Al , c j Am = c k [ Am ]
Figure imgb0003
Formally, if i = ( a 1 , ..., a n ) is an individual, the proper lattice Ti = (Ci, Ri) associated with the individual i is defined as follows: This = vs 1 , ... vs not AT 1 × ... Year / at j vs j aj
Figure imgb0002
Ri = vs j vs k This × This / ! al / vs j al , vs k al cover al Am al , vs j Am = vs k [ Am ]
Figure imgb0003

Ainsi, un treillis général contenant l'ensemble des concepts peut être construit par ajouts successifs des treillis propres.Thus, a general lattice containing all the concepts can be constructed by successive additions of clean lattices.

L'insertion d'un individu dans le treillis général se fait en fusionnant le treillis propre à l'individu avec le treillis général.The insertion of an individual into the general lattice is done by fusing the lattice proper to the individual with the general lattice.

Formellement, étant donné l'ensemble I d'individus, le treillis général T = (C,R) est défini de la manière suivante : C = i I Ci et R = i I Ri

Figure imgb0004
Formally, given the set I of individuals, the general lattice T = ( C, R ) is defined as follows: VS = i I This and R = i I Ri
Figure imgb0004

Ainsi, un treillis propre peut être construit pour chaque alerte issue des sondes de détection d'intrusions 11a, 11b, 11c. Ce treillis propre comporte donc des noeuds correspondant à des alertes, liés entre eux par des arcs de sorte que chaque noeud est lié à un ou des noeuds parents et/ou un ou des noeuds enfants ou descendants.Thus, a clean mesh can be constructed for each alert from the intrusion detection probes 11a, 11b, 11c. This clean lattice therefore comprises nodes corresponding to alerts, interconnected by arcs so that each node is linked to one or more parent nodes and / or one or more child or descendant nodes.

Ensuite, chacun des treillis propres associés aux alertes issues des sondes de détection d'intrusions peut être fusionné de façon itérative dans le treillis général.Next, each of the clean lattices associated with the alerts from the intrusion detection probes may be iteratively fused into the general lattice.

Finalement, des alertes synthétiques peuvent être identifiées dans le treillis général, en sélectionnant les alertes qui sont à la fois les plus pertinentes et les plus générales selon des critères statistiques et selon l'appartenance de leurs attributs à des niveaux inférieurs des structures hiérarchiques.Finally, synthetic warnings can be identified in the general lattice, by selecting the alerts that are both most relevant and general according to statistical criteria and according to the membership of their attributes at lower levels of the hierarchical structures.

En effet, les figures 2 à 4, montrent des organigrammes illustrant la formation du treillis propre à un individu donné, la fusion d'un treillis propre donné dans le treillis général, et la sélection des concepts pertinents et généraux.Indeed, Figures 2 to 4 show flowcharts illustrating the formation of the lattice specific to a given individual, the merger of a given lattice in the general lattice, and the selection of relevant and general concepts.

L'organigramme de la figure 2 montre la formation d'un treillis propre à un individu donné. Plus particulièrement, il montre la construction d'un treillis propre Ti = (Ci,Ri) en cours d'élaboration au voisinage d'un concept donné ou alerte donnée.The flowchart in Figure 2 shows the formation of a lattice specific to a given individual. More particularly, it shows the construction of a proper lattice Ti = ( Ci, Ri ) being developed in the vicinity of a given given concept or alert.

Ainsi, à l'étape E0, on définit le concept donné c = (a 1 ,..., an ) ainsi que l'indice l correspondant à l'indice de l'attribut à partir duquel la généralisation est mise en oeuvre, sachant que les généralisations selon les attributs d'indices inférieurs sont considérées comme correspondant à des concepts qui ont déjà été ajoutés au treillis propre Ti au cours d'appels récursifs antérieurs.Thus, in step E0, the given concept c = ( a 1 , ..., a n ) is defined , as is the index l corresponding to the index of the attribute from which the generalization is implemented. , recognizing that the generalizations according to the lower index attributes are considered to correspond to concepts that have already been added to the own lattice Ti during previous recursive calls.

Les étapes E1 à E3 sont une boucle principale qui itère sur les indices d'attributs selon lesquels le noeud donné en paramètre, à l'étape E0, va être généralisé. L'itération est faite pour tous les indices k entre l et n et pour tous les attributs ak généralisables.The steps E1 to E3 are a main loop that iterates over the attribute indices according to which the node given as parameter, at the step E0, will be generalized. Iteration is done for all the indices k between l and n and for all the attributes a k generalizable.

Ainsi, pour tout attribut ak qui peut être généralisé à partir de sa structure hiérarchique, on calcule à l'étape E2 la fonction genAtt(c,k) qui récupère la valeur de l'attribut qui généralise celui de ak pour former un concept p correspondant à la généralisation du concept c selon l'indice k.Thus, for every attribute a k that can be generalized from its hierarchical structure, the function genAtt ( c, k ) is calculated in step E2 , which retrieves the value of the attribute that generalizes that of a k to form a concept p corresponding to the generalization of the concept c according to the index k .

Ce concept généralisé p est ajouté au treillis Ci = Cip et un arc est ajouté allant du concept c vers le concept p, c'est-à-dire Ri = Ri∪{(p,c)}. This generalized concept p is added to the lattice Ci = Cip and an arc is added from the concept c to the concept p , that is to say Ri = Ri∪ {( p, c )} .

L'étape E3 est une boucle interne qui ajoute les arcs manquants allant des noeuds parents du concept c, issus de la généralisation de c selon tous les attributs d'indice inférieur ou égal à k, c'est-à-dire Ri = Ri∪{(↑ Ak Ah (c),p)}.Step E3 is an internal loop that adds the missing arcs from the parent nodes of the concept c, resulting from the generalization of c according to all the attributes of index less than or equal to k , that is to say Ri = Ri ∪ {(↑ Ak Ah ( c ), p )}.

L'étape E4 est un appel récursif où l'organigramme est appliqué pour des nouveaux paramètres.Step E4 is a recursive call where the flowchart is applied for new parameters.

Ainsi, l'algorithme de la formation d'un treillis propre pour un concept donné c peut être décrit comme ci-dessous:

Figure imgb0005
Figure imgb0006
Thus, the algorithm for forming a clean lattice for a given concept c can be described as below:
Figure imgb0005
Figure imgb0006

Plus particulièrement, la figure 2A montre un exemple de la construction du treillis propre 31 à partir d'une alerte donnée correspondant à un noeud donné A selon le deuxième attribut du noeud A. Autrement dit, à partir des paramètres d'appel (c = A,k = 1,Ti = Tc).More particularly, FIG. 2A shows an example of the construction of the own lattice 31 from a given alert corresponding to a given node A according to the second attribute of the node A. In other words, from the call parameters ( c = A, k = 1 , Ti = Tc ).

D'une manière générale, pour tout attribut généralisable de l'alerte donnée, on récupère la valeur généralisée de cet attribut à partir de sa structure hiérarchique pour former une nouvelle alerte plus générale que l'alerte donnée.Generally speaking, for any generalizable attribute of the given alert, the generalized value of this attribute is retrieved from its hierarchical structure to form a new alert that is more general than the alert given.

Selon cet exemple, à l'étape k = 2 de l'algorithme, un nouveau noeud D correspondant à la nouvelle alerte formée selon la généralisation du deuxième attribut du noeud A, est ajouté au treillis propre ainsi qu'un arc (D, A) allant du nouveau noeud D de la nouvelle alerte au noeud A de l'alerte donnée.According to this example, at step k = 2 of the algorithm, a new node D corresponding to the new alert formed according to the generalization of the second attribute of node A, is added to the lattice and an arc (D, A ) from the new node D of the new alert to the node A of the given alert.

Ensuite des arcs manquants allant des noeuds parents de l'alerte donnée A au noeud D de la nouvelle alerte sont ajoutés. Les noeuds parents de l'alerte donnée sont issus de la généralisation de l'alerte donnée selon ses autres attributs.Then missing arcs from the parent nodes of the alert A given at node D of the new alert are added. The parent nodes of the given alert come from the generalization of the alert given according to its other attributes.

Selon cet exemple, à l'itération précédente (k = 1), le treillis de sommet B a été construit. Les généralisations de D selon des attributs dont l'indice est inférieur à k ont déjà été ajoutées, en l'occurrence C, pour k = 1. Ainsi, seul l'arc manquant (C, D) est ajouté.According to this example, at the previous iteration (k = 1 ), the vertex lattice B has been constructed. The generalizations of D according to attributes whose index is less than k have already been added, in this case C, for k = 1. Thus, only the missing arc (C, D) is added.

L'algorithme est ré-exécuté récursivement avec comme paramètres (D, 2, T).The algorithm is re-executed recursively with parameters (D, 2, T).

D'une manière générale, le treillis propre à un individu i=(a 1 ,...,an ) est obtenu en appelant l'algorithme Treillis Propre (c=i,k=1,Ti=({i},{ })), sachant qu'au départ, le treillis propre associé au noeud i est formé d'un seul noeud et l'ensemble des arcs est encore vide.In general, the trellis specific to individual i = (a 1, ..., a n) is obtained by calling the Lattice Clean algorithm (c = i, k = 1, T = ({i} {})), knowing that initially, the clean lattice associated with node i is formed of a single node and the set of arcs is still empty.

L'organigramme de la figure 3 montre la fusion d'un treillis propre donné dans le treillis général.The flowchart of FIG. 3 shows the fusion of a given clean lattice in the general lattice.

A l'étape E10, les paramètres d'initialisation sont définis. En particulier, il est sélectionné un premier noeud correspondant à une première alerte ou concept h appartenant au treillis propre Ti = (Ci,Ri), et un second noeud correspondant à une seconde alerte ou concept g appartenant au treillis général T = (C,R).In step E10, the initialization parameters are defined. In particular, it is selected a first node corresponding to a first alert or concept h belonging to the own lattice Ti = ( Ci, Ri ) , and a second node corresponding to a second alert or concept g belonging to the general lattice T = ( C, R ).

La boucle principale entre les étapes E11 et E14 ou E15, itère sur l'ensemble des noeuds enfants du noeud h du treillis propre passé en paramètre, c'est-à-dire pour hj ∈↓ (h). The main loop between the steps E11 and E14 or E15, iterates on the set of child nodes of the node h of the lattice clean passed in parameter, that is to say for h j ∈ ↓ ( h ) .

Ainsi, à l'étape E11 un noeud enfant hj du premier noeud h est choisi.Thus, in step E11 a child node h j of the first node h is chosen.

A l'étape E12, on vérifie si ce noeud enfant hj du premier noeud h appartient aussi au treillis général. Autrement dit, on vérifie si ∃g j ∈↓ (g) tel que gj = hj .In step E12, it is checked whether this child node h j of the first node h also belongs to the general lattice. In other words, we check if ∃g j ∈ ↓ ( g ) such that g j = h j .

Dans l'affirmative, tous les arcs provenant des noeuds parents de ce noeud enfant sont supprimés Ri = Ri-↑ (hj ) à l'étape E13, avant de passer à l'étape E14.If so, all the arcs from the parent nodes of this child node are deleted Ri = R - ↑ ( h j ) in step E13, before proceeding to step E14.

En effet, la proposition suivante dit que si un noeud hj d'un treillis propre existe déjà dans le treillis général, alors l'ensemble de ses parents s'y trouve aussi, c'est-à-dire : h j Ci g k C , h j = g h h C .

Figure imgb0007
Indeed, the following proposition says that if a node h j of a proper lattice already exists in the general lattice, then all of its parents are also there, that is to say: h j This boy Wut k VS , h j = boy Wut h h VS .
Figure imgb0007

L'étape E15 est un appel récursif où l'organigramme est appliqué à nouveau à partir de l'étape E11 mais pour des nouveaux paramètres.Step E15 is a recursive call where the flowchart is reapplied from step E11 but for new parameters.

En effet, les enfants du noeud hj ne sont pas forcément dans le treillis général, il faut donc exécuter récursivement l'algorithme sur ce noeud hj .Indeed, the children of the node h j are not necessarily in the general lattice, so we must recursively execute the algorithm on this node h j .

En revanche, si le noeud enfant n'appartient pas au treillis général, alors il suffit de l'y ajouter T=T∪Thj ainsi que l'ensemble de ses descendants à l'étape E15 avant de revenir à l'étape E11.On the other hand, if the child node does not belong to the general lattice, then it suffices to add T = T∪Th j and all of its descendants to step E15 before returning to step E11. .

La contraposée de la proposition précédente nous assure qu'il n'y aura pas de duplication de noeuds.The contraposition of the previous proposition assures us that there will be no duplication of nodes.

Ainsi, l'algorithme de la fusion d'un treillis propre au treillis général peut être décrit comme ci-dessous :

Figure imgb0008
Thus, the algorithm for the merger of a lattice specific to the general lattice can be described as follows:
Figure imgb0008

Les figures 3A et 3B schématisent le mécanisme de fusion d'un treillis propre au treillis général, selon l'organigramme de la figure 3.FIGS. 3A and 3B show schematically the merging mechanism of a lattice specific to the general lattice, according to the flowchart of FIG. 3.

Dans ces deux figures 3A et 3B, la portion de treillis de gauche appartient au treillis général et celle de droite au treillis propre que l'on souhaite fusionner. Les noeuds grisés sont les paramètres d'appel de l'algorithme. Ils sont égaux, par hypothèse (A = A').In these two FIGS. 3A and 3B, the left trellis portion belongs to the general trellis and the right trellis portion belongs to the trellis that one wishes to merge. Grayed out nodes are the calling parameters of the algorithm. They are equal, by hypothesis (A = A ').

Selon la figure 3A, l'un des enfants B' de A' est déjà présent dans A (B' = B). Les liens 41, 43, et 45 vers les ancêtres immédiats de B' sont supprimés car on sait qu'ils sont déjà dans le treillis général. L'algorithme est alors appelé récursivement sur B et B'.According to Figure 3A, one of the children B 'of A' is already present in A (B '= B) . Links 41, 43, and 45 to the immediate ancestors of B ' are deleted because we know that they are already in the general lattice. The algorithm is then called recursively on B and B '.

Selon la figure 3B, le noeud C n'existe pas en tant qu'enfant de A, alors un lien 47 (en pointillés) est créé entre A et C, et le lien 49 qui liait C à A' est supprimé. Le sous treillis ayant comme sommet C est donc intégré au treillis général.According to FIG. 3B, the node C does not exist as a child of A, then a link 47 (in dashed lines) is created between A and C, and the link 49 which links C to A 'is deleted. The sub-lattice with vertex C is therefore integrated into the general lattice.

L'algorithme est appelé avec comme arguments les sommets du treillis propre à l'individu à insérer et le sommet du treillis général. Comme tous les treillis ont un même sommet correspondant au noeud le plus général, l'hypothèse selon laquelle les concepts passés en arguments à l'algorithme sont égaux est respectée.The algorithm is called with as arguments the vertices of the lattice specific to the individual to be inserted and the vertex of the general lattice. As all the lattices have the same vertex corresponding to the most general node, the assumption that the concepts passed in arguments to the algorithm are equal is respected.

L'organigramme de la figure 4 montre l'identification des alertes ou concepts synthétiques fournissant un ensemble P des alertes ou concepts qui sont à la fois les plus pertinents et les plus généraux d'une alerte ou d'un concept c.The flowchart in Figure 4 shows the identification of synthetic alerts or concepts providing a set P of alerts or concepts that are both the most relevant and the most general of an alert or concept c .

Une alerte ou un concept c est dit pertinent si chacun des ensembles ↓ Ai (c) est « homogène » et « suffisamment grand ».An alert or concept c is relevant if each of the sets ↓ Ai ( c ) is "homogeneous" and "sufficiently large".

Un ensemble d'alertes ou de concepts est homogène si la dispersion du nombre d'individus couverts par chaque concept n'est pas trop grande. On utilise à cet effet, de façon connue un coefficient de variation.A set of alerts or concepts is homogeneous if the dispersion of the number of individuals covered by each concept is not too great. For this purpose, a coefficient of variation is used in a known manner.

Un ensemble Ai (c) est suffisamment grand si le nombre d'éléments qui le compose est supérieur à une valeur seuil liée au niveau d'abstraction ou de généralisation de l'attribut Ai de c.A set Ai ( c ) is sufficiently large if the number of elements that compose it is greater than a threshold value linked to the level of abstraction or generalization of the attribute Ai of c .

Formellement : p c Ai , Ai > τ c Ai et σ F Ai m F Ai < 1 ,

Figure imgb0009

où la fonction p(c) désigne une fonction booléenne indiquant si un noeud est pertinent; FAi est l'ensemble formé des d'individus couverts par chaque concept de Ai (c) ; mFAi est la moyenne de FAi ; σFAi sa variance; et τcAi représente la valeur de seuil liée au niveau d'abstraction du domaine d'attribut Ai de c. Formally: p vs Have , Have > τ vs Have and σ F Have m F Have < 1 ,
Figure imgb0009

where the function p ( c ) designates a Boolean function indicating whether a node is relevant; F Ai is the set of individuals covered by each concept of Ai ( c ); m F Have is the average of F Ai ; σ F Have its variance; and τ c Have represents the threshold value related to the abstraction level of the attribute domain Ai of c.

Le nombre d'individus couverts par un concept est une valeur liée à chaque noeud du treillis et mise à jour lors de la fusion d'un treillis propre associé à un individu avec le treillis général.The number of individuals covered by a concept is a value related to each node of the lattice and updated upon the merger of a clean lattice associated with an individual with the general lattice.

Ainsi, une alerte est dite pertinente si chacun des ensembles des noeuds enfants de l'alerte pertinente c issus de la spécialisation de cette alerte c selon chacun de ses domaines d'attributs est homogène, et si le nombre d'éléments composant chacun des ensembles des noeuds enfants de l'alerte pertinente c est supérieur à une valeur seuil.Thus, an alert is said to be relevant if each of the sets of child nodes of the relevant alert c resulting from the specialization of this alert c according to each of its attribute domains is homogeneous, and if the number of elements composing each of the sets child nodes of the relevant alert c is greater than a threshold value.

L'étape E20 de l'organigramme de la figure 4, correspond à la définition des paramètres d'appel. Ces paramètres comportent un concept c du treillis général T = (C,R), un ensemble P des concepts pertinents précédemment trouvés, et un entier t utilisé pour le parcours du treillis.Step E20 of the flowchart of FIG. 4 corresponds to the definition of the call parameters. These parameters comprise a concept c of the general lattice T = ( C, R ), a set P of the relevant concepts previously found, and an integer t used for the tracing of the lattice.

L'étape E21, est un test pour vérifier la pertinence de c. Ainsi si le concept c est pertinent, alors on passe à l'étape E22, où le concept c est ajouté à l'ensemble P des concepts pertinents P=P∪{c}, et l'ensemble des concepts plus spécifiques que c éventuellement ajoutés précédemment sont éliminés de l'ensemble P, c'est-à-dire P = P-{ci P/ci c}. En effet, on cherche les concepts les plus abstraits, tout en étant pertinents.Step E21, is a test to check the relevance of c . So if the concept c is relevant, then we go to the step E22, where the concept c is added to the set P of the relevant concepts P = P∪ { c }, and the set of more specific concepts than c possibly previously added are eliminated from the set P , that is to say P = P- {c i P / c i c }. Indeed, we search for the most abstract concepts, while being relevant.

En revanche, si c n'est pas pertinent, alors l'algorithme est appliqué récursivement, à l'étapes E23 sur l'ensemble des enfants de c issus de la spécialisation de c selon les attributs d'indices i supérieurs ou égaux à t, c'est-à-dire ci ∈ ↓Ai (c), sachant que les autres attributs ont déjà été analysés.On the other hand, if c is not relevant, then the algorithm is applied recursively, at the steps E23 on all the children of c coming from the specialization of c according to the attributes of indexes i superior or equal to t, that is to say c i ∈ ↓ Ai ( c ), knowing that the other attributes have already been analyzed.

Quand l'algorithme se termine, une liste comportant les concepts jugés pertinents et généraux est fournie à l'unité de sortie 23 du système de gestion d'alertes 13 afin qu'un opérateur de sécurité puisse avoir une vision globale de l'ensemble des alertes. Si ce dernier souhaite des détails sur un concept quelconque c qu'il juge trop abstrait, alors l'algorithme est re-exécuté sur l'ensemble des enfants de ce concept c.When the algorithm ends, a list including the concepts considered relevant and general is provided to the output unit 23 of the warning management system 13 so that a security operator can have a global view of all alerts. If the latter wants details on any concept c that he deems too abstract, then the algorithm is re-executed on all the children of this concept c .

Ainsi, l'algorithme d'identification des concepts synthétiques peut être décrit comme ci-dessous :

Figure imgb0010
Thus, the algorithm for identifying synthetic concepts can be described as below:
Figure imgb0010

On notera que les alertes synthétiques sont associées à des différents groupes d'alertes issus des sondes de sorte que ces groupes ne sont pas forcément mutuellement exclusifs.It should be noted that the synthetic alerts are associated with different groups of alerts from the probes so that these groups are not necessarily mutually exclusive.

En effet, la figure 5 montre de façon très schématique une alerte associée à différentes alertes synthétiques.Indeed, Figure 5 very schematically shows an alert associated with different synthetic alerts.

Les alertes A1 à A6 émises par les sondes de détection d'intrusions sont les feuilles du treillis général. Le groupe d'alertes associé à une alerte générale est l'ensemble des feuilles accessibles depuis cette alerte générale.The A1 to A6 alerts issued by the intrusion detection probes are the sheets of the general lattice. The alert group associated with a general alert is the set of sheets accessible from this general alert.

Ainsi, le groupe d'alerte A123 est associé à l'alerte synthétique S1 et le groupe d'alerte A34 est associé à l'alerte synthétique S2. En revanche, les alertes A4 à A6 sont associées à une alerte générale A7 qui n'est pas une alerte synthétique.Thus, the alert group A123 is associated with the synthetic alert S1 and the alert group A34 is associated with the synthetic alert S2. On the other hand, the A4 to A6 alerts are associated with an A7 general alert which is not a synthetic alert.

Etant donné la structure même du treillis, les groupes d'alertes ne sont pas mutuellement exclusifs. Ainsi, l'alerte A3 participe à deux phénomènes, c'est-à-dire à deux groupes d'alertes différents A123 et A34.Given the very structure of the lattice, the groups of alerts are not mutually exclusive. Thus, the alert A3 participates in two phenomena, that is to say two different groups of alerts A123 and A34.

Les alertes issues de sondes de détection d'intrusions sont des individus définis par une pluralité d'attributs appartenant à une pluralité de domaines d'attributs. Les domaines d'attributs peuvent comporter un ensemble des identifiants d'alertes, un ensemble des sources d'attaques, un ensemble des cibles d'attaques, et un ensemble des dates d'attaques.Alerts from intrusion detection probes are individuals defined by a plurality of attributes belonging to a plurality of attribute domains. Attribute domains can include a set of alert identifiers, a set of attack sources, a set of attack targets, and a set of attack dates.

Les figures 6A à 7, montrent un exemple simplifié de classification d'un ensemble d'alertes issues de sondes de détection d'intrusions.FIGS. 6A to 7 show a simplified example of classification of a set of alerts originating from intrusion detection probes.

Selon cet exemple, les alertes sont des triplets (nom,src,dst)∈ N×S×D,N représente l'ensemble des identifiants d'alertes, S représente l'ensemble des sources d'attaques, et D représente l'ensemble des cibles d'attaques. Dans d'autres exemples, les alertes pourraient être constituées d'autres types d'attributs, ou bien les mêmes mais avec des domaines définis différemment.According to this example, the alerts are triplets ( name, src, dst ) ∈ N × S × D, where N represents the set of the alert identifiers, S represents the set of attack sources, and D represents the set of attack targets. In other examples, the alerts could consist of other types of attributes, or the same but with domains defined differently.

Au niveau d'abstraction le plus bas, les identifiants d'alertes sont les identifiants de signatures de l'outil de détection d'intrusions Snort. Le niveau d'abstraction supérieur est constitué des classes d'attaques définies par Snort. Le niveau d'abstraction supérieur est constitué d'un seul élément, «any». At the lowest level of abstraction, the alert identifiers are the signature identifiers of the Snort intrusion detection tool. The higher level of abstraction consists of the attack classes defined by Snort . The higher level of abstraction consists of a single element, "any".

En effet, la figure 6A montre une hiérarchie simplifiée associée au domaine de l'ensemble des identifiants. Le premier niveau d'abstraction ou de généralisation N11 comporte les éléments « att1 » et « att2 ». Les deuxième et troisième niveaux de généralisation N12, N13 comportent les éléments « web-attack » et « any » respectivement.Indeed, Figure 6A shows a simplified hierarchy associated with the domain of the set of identifiers. The first level of abstraction or generalization N11 includes the elements "att1" and "att2". The second and third levels of generalization N12, N13 include the elements "web-attack" and "any" respectively.

Au niveau d'abstraction le plus bas, les sources d'attaques sont des adresses du type IPv4. Le niveau d'abstraction supérieur est constitué des noms de domaines de réseau gérés par l'organisme IANA et ses branches locales (RIPE, APNIC, ARIN, etc.). Les adresses IP non enregistrées dans la base IANA ou les adresses publiques internes au système d'information surveillé ou les adresses IP privées, sont abstraites en notation du type CIDR (par exemple 192.168.0.0/24). Le niveau supérieur peut être constitué de deux éléments, « external » et « internal » pour désigner l'extérieur et l'intérieur du système d'information. Le niveau d'abstraction suivant est constitué d'un seul élément, « any ».At the lowest abstraction level, the attack sources are IPv4 type addresses. The higher level of abstraction consists of network domain names managed by the IANA organization and its local branches (RIPE, APNIC, ARIN, etc.). IP addresses not registered in the IANA database or public addresses internal to the monitored information system or private IP addresses, are abstracted in CIDR type notation (eg 192.168.0.0/24). The upper level may consist of two elements, "external" and "internal" to designate the exterior and interior of the information system. The next level of abstraction consists of a single element, "any".

L'exemple de la figure 6B montre une hiérarchie simplifiée associée au domaine de l'ensemble de sources d'attaques. Le premier niveau d'abstraction ou de généralisation comportant les éléments « 192.168.0.1 » et « 192.168.0.33 ». Les deuxième et troisième niveaux de généralisation comportent les éléments « internal » et « any » respectivement.The example in Figure 6B shows a simplified hierarchy associated with the domain of the set of attack sources. The first level of abstraction or generalization with the elements "192.168.0.1" and "192.168.0.33". The second and third levels of generalization include the elements "internal" and "any" respectively.

Au niveau d'abstraction le plus bas, les cibles d'attaques sont les adresses IP publiques et privées du système d'information. Le niveau d'abstraction suivant est constitué des adresses de réseau en notation CIDR. Le niveau d'abstraction suivant est constitué d'un seul élément, «any».At the lowest level of abstraction, attack targets are the public and private IP addresses of the information system. The next level of abstraction is network addresses in CIDR notation. The next level of abstraction consists of a single element, "any".

La figure 6C montre une hiérarchie simplifiée associée au domaine de l'ensemble de cibles d'attaques. Les premier, deuxième et troisième niveaux d'abstraction ou de généralisation comportent les éléments « 192.168.0.10 », « proxy », et « any » respectivement.Figure 6C shows a simplified hierarchy associated with the domain of the set of attack targets. The first, second and Third levels of abstraction or generalization include the elements "192.168.0.10", "proxy", and "any" respectively.

La figure 7 illustre un treillis général associé à deux alertes A1 et A2 définis par A1(att2, 192.168.0.1, 192.168.0.10) et A2(att1, 192.168.0.33, 192.168.0.10).Figure 7 illustrates a general lattice associated with two A1 and A2 alerts defined by A1 (att2, 192.168.0.1, 192.168.0.10) and A2 (att1, 192.168.0.33, 192.168.0.10).

Selon cet exemple et d'après les hiérarchies d'attributs des figures 6A à 6C, les identifiants d'attaque sont généralisés en classe d'attaque « web-attack », puis en « any ».According to this example and according to the attribute hierarchies of FIGS. 6A to 6C, the attack identifiers are generalized to the attack class "web-attack" and then to "any".

Les adresses IP des attaquants sont généralisées en « internal » puis en « any ».IP addresses of attackers are generalized to "internal" then "any".

Les adresses IP des victimes sont généralisées en fonction d'hôte « proxy », puis en « any ».The IP addresses of the victims are generalized according to "proxy" host, then to "any".

Selon cet exemple, il y a deux attaquants distincts 192.168.0.1 de l'alerte A1 et 192.168.0.33 de l'alerte A2 qui sont des adresses IP internes. Il y a une seule victime 192.168.0.10, qui est un proxy web.In this example, there are two separate 192.168.0.1 attackers of the A1 alert and 192.168.0.33 of the A2 alert that are internal IP addresses. There is only one victim 192.168.0.10, which is a web proxy.

L'alerte la plus abstraite inférée par le système est (any, any, any). Les flèches pleines dénotent une généralisation selon l'attribut qui correspond à l'attaque, les flèches en tirets dénotent une généralisation selon l'attribut qui correspond à l'attaquant, et les flèches en pointillés dénotent une généralisation selon l'attribut qui correspond à la victime.The most abstract alert inferred by the system is (any, any, any). The full arrows denote a generalization according to the attribute that corresponds to the attack, the arrows in dashes denote a generalization according to the attribute that corresponds to the attacker, and the dashed arrows denote a generalization according to the attribute that corresponds to the victim.

A l'issue du processus de sélection des alertes pertinentes, le système propose l'alerte synthétique (web-attack, internal, proxy). Les autres alertes sont soit trop générales, soit trop spécifiques.At the end of the selection process of the relevant alerts, the system proposes the synthetic alert (web-attack, internal, proxy). Other alerts are either too general or too specific.

Claims (9)

  1. Method of automatically classifying a set of alerts obtained from intrusion detection probes (11a, 11b, 11c) of an information security system (1) for producing summary alerts, each alert being defined by a plurality of qualitative attributes (a1,..., an ) affiliated to a plurality of attribute domains (A1 , ..., An ), each of which is provided with a partial order relation, characterized in that it comprises the following steps:
    - organizing the attributes affiliated to each attribute domain into a hierarchical structure comprising a number of levels defined according to the partial order relation of the attribute domain, the plurality of attribute domains thus forming a number of hierarchical structures;
    - constructing for each alert obtained from the intrusion detection probes (11a, 11b, 11c) a trellis specific to this alert by generalizing each alert according to each of its attributes and to all the levels of the hierarchical structure, the specific trellis comprising nodes, corresponding to alerts, interlinked by arcs such that each node is linked to one or more parent nodes and/or one or more child or descendent nodes;
    - iteratively merging each of the specific trellises into a general trellis;
    - identifying in the general trellis, the summary alerts by selecting the alerts that are both the most relevant and the most general according to statistical criteria and according to the affiliation of their attributes to lower levels of the hierarchical structures; and
    - producing summary alerts to an output unit (23) of an alert management system (13) in order to present an overview of all the alerts obtained from the intrusion detection probes (11a, 11b, 11c).
  2. Method according to Claim 1, characterized in that the construction of a specific trellis comprises the following steps:
    - recovering for any generalizable attribute of a given alert, the generalized value of this attribute from its hierarchical structure to form a new alert that is more general than said given alert;
    - adding a new node to the specific trellis corresponding to the new alert and adding an arc going from the new node of the new alert to the node of the given alert;
    - adding missing arcs going from the parent nodes of the given alert, derived from the generalization of the given alert according to its other attributes, to the node of the new alert.
  3. Method according to any one of Claims 1 and 2, characterized in that the merging of a given specific trellis into the general trellis comprises the following steps:
    - selecting a first node corresponding to a first alert affiliated to the given specific trellis, and a second node corresponding to a second alert affiliated to the general trellis;
    - deleting all the arcs originating from the parent nodes of a child node of the first node if said child node is also affiliated to the general trellis,
    - adding to the general trellis said child node and all of its descendents if said child node is not affiliated to the general trellis.
  4. Method according to any one of Claims 1 to 3, characterized in that a relevant alert is identified when each of the sets of the child nodes of the relevant alert obtained from a specialization of this alert according to each of its attribute domains is uniform, and when the number of elements forming said each of the sets of the child nodes of the relevant alert is greater than a threshold value.
  5. Method according to any one of Claims 1 to 4, characterized in that the summary alerts are associated with different alert groups obtained from the probes such that these groups are not mutually exclusive.
  6. Method according to any one of Claims 1 to 5, characterized in that the plurality of attribute domains comprises domains from the following sets: set of alert identifiers, set of attack sources, set of attack targets, and set of attack dates.
  7. Computer program characterized in that it is designed to implement the method according to any one of Claims 1 to 6 when it is executed by the alert management system (13).
  8. Alert management system (13) for automatically classifying a set of alerts obtained from intrusion detection probes (11a, 11b, 11c) producing summary alerts, each alert being defined by a plurality of qualitative attributes (a1 , ..., an ) affiliated to a plurality of attribute domains (A1 , ..., An ), each of which is provided with a partial order relation, characterized in that it comprises:
    - processing means for organizing the attributes affiliated to each attribute domain into a hierarchical structure comprising a number of levels defined according to the partial order relation of the attribute domain, the plurality of attribute domains thus forming a number of hierarchical structures;
    - processing means for constructing, for each alert obtained from the intrusion detection probes (11a, 11b, 11c), a trellis specific to this alert by generalizing each alert according to each of its attributes and to all the levels of the hierarchical structure, the specific trellis comprising nodes, corresponding to alerts, interlinked by arcs such that each node is linked to one or more parent nodes and/or one or more child or descendent nodes;
    - processing means for iteratively merging into a general trellis each of the specific trellises;
    - processing means for identifying in the general trellis the summary alerts by selecting the alerts that are both the most relevant and the most general according to statistical criteria and according to the affiliation of their attributes to lower levels of the hierarchical structures; and
    - processing means for producing summary alerts to an output unit (23) in order to present an overview of the set of alerts obtained from the intrusion detection probes (11a, 11b, 11c).
  9. Information security system (1) comprising intrusion detection probes and an alert management system (13) according to Claim 8.
EP04816391A 2003-12-17 2004-12-16 Method for automatically classifying a set of alarms emitted by sensors for detecting intrusions of a information security system Not-in-force EP1695485B1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PL04816391T PL1695485T3 (en) 2003-12-17 2004-12-16 Method for automatically classifying a set of alarms emitted by sensors for detecting intrusions of a information security system

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FR0314782A FR2864392A1 (en) 2003-12-17 2003-12-17 Intrusion sensing probe alarm set classifying process for use in information security system, involves constructing lattice for each alarm originated from intrusion sensing probes, and merging lattices to form general lattice
PCT/FR2004/003251 WO2005060160A2 (en) 2003-12-17 2004-12-16 Method for automatically classifying a set of alarms emitted by sensors for detecting intrusions of a information security system

Publications (2)

Publication Number Publication Date
EP1695485A2 EP1695485A2 (en) 2006-08-30
EP1695485B1 true EP1695485B1 (en) 2007-03-28

Family

ID=34630232

Family Applications (1)

Application Number Title Priority Date Filing Date
EP04816391A Not-in-force EP1695485B1 (en) 2003-12-17 2004-12-16 Method for automatically classifying a set of alarms emitted by sensors for detecting intrusions of a information security system

Country Status (7)

Country Link
US (1) US7506373B2 (en)
EP (1) EP1695485B1 (en)
AT (1) ATE358373T1 (en)
DE (1) DE602004005616T2 (en)
FR (1) FR2864392A1 (en)
PL (1) PL1695485T3 (en)
WO (1) WO2005060160A2 (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7937370B2 (en) 2000-09-22 2011-05-03 Axeda Corporation Retrieving data from a server
US7966418B2 (en) 2003-02-21 2011-06-21 Axeda Corporation Establishing a virtual tunnel between two computer programs
US8055758B2 (en) 2000-07-28 2011-11-08 Axeda Corporation Reporting the state of an apparatus to a remote computer
US8060886B2 (en) 2002-04-17 2011-11-15 Axeda Corporation XML scripting of SOAP commands
US8065397B2 (en) 2006-12-26 2011-11-22 Axeda Acquisition Corporation Managing configurations of distributed devices
US8108543B2 (en) 2000-09-22 2012-01-31 Axeda Corporation Retrieving data from a server
US8370479B2 (en) 2006-10-03 2013-02-05 Axeda Acquisition Corporation System and method for dynamically grouping devices based on present device conditions
US8406119B2 (en) 2001-12-20 2013-03-26 Axeda Acquisition Corporation Adaptive device-initiated polling
US8478861B2 (en) 2007-07-06 2013-07-02 Axeda Acquisition Corp. Managing distributed devices with limited connectivity

Families Citing this family (31)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8176527B1 (en) 2002-12-02 2012-05-08 Hewlett-Packard Development Company, L. P. Correlation engine with support for time-based rules
US7376969B1 (en) 2002-12-02 2008-05-20 Arcsight, Inc. Real time monitoring and analysis of events from multiple network security devices
US7788722B1 (en) 2002-12-02 2010-08-31 Arcsight, Inc. Modular agent for network security intrusion detection system
US7899901B1 (en) 2002-12-02 2011-03-01 Arcsight, Inc. Method and apparatus for exercising and debugging correlations for network security system
US7219239B1 (en) 2002-12-02 2007-05-15 Arcsight, Inc. Method for batching events for transmission by software agent
US7650638B1 (en) 2002-12-02 2010-01-19 Arcsight, Inc. Network security monitoring system employing bi-directional communication
US7607169B1 (en) 2002-12-02 2009-10-20 Arcsight, Inc. User interface for network security console
US7260844B1 (en) 2003-09-03 2007-08-21 Arcsight, Inc. Threat detection in a network security system
US8015604B1 (en) 2003-10-10 2011-09-06 Arcsight Inc Hierarchical architecture in a network security system
US9027120B1 (en) 2003-10-10 2015-05-05 Hewlett-Packard Development Company, L.P. Hierarchical architecture in a network security system
US7565696B1 (en) 2003-12-10 2009-07-21 Arcsight, Inc. Synchronizing network security devices within a network security system
US8528077B1 (en) 2004-04-09 2013-09-03 Hewlett-Packard Development Company, L.P. Comparing events from multiple network security devices
US7509677B2 (en) 2004-05-04 2009-03-24 Arcsight, Inc. Pattern discovery in a network security system
US9100422B1 (en) 2004-10-27 2015-08-04 Hewlett-Packard Development Company, L.P. Network zone identification in a network security system
US7644438B1 (en) 2004-10-27 2010-01-05 Arcsight, Inc. Security event aggregation at software agent
US7809131B1 (en) 2004-12-23 2010-10-05 Arcsight, Inc. Adjusting sensor time in a network security system
US7647632B1 (en) 2005-01-04 2010-01-12 Arcsight, Inc. Object reference in a system
US8850565B2 (en) * 2005-01-10 2014-09-30 Hewlett-Packard Development Company, L.P. System and method for coordinating network incident response activities
US7844999B1 (en) 2005-03-01 2010-11-30 Arcsight, Inc. Message parsing in a network security system
US8601068B2 (en) * 2008-06-26 2013-12-03 Ca, Inc. Information technology system collaboration
NL2002694C2 (en) * 2009-04-01 2010-10-04 Univ Twente Method and system for alert classification in a computer network.
EP2438511B1 (en) 2010-03-22 2019-07-03 LRDC Systems, LLC A method of identifying and protecting the integrity of a set of source data
US8595837B2 (en) * 2011-08-29 2013-11-26 Novell, Inc. Security event management apparatus, systems, and methods
US8793783B2 (en) 2011-12-20 2014-07-29 International Business Machines Corporation Dynamic allocation of network security credentials for alert notification recipients
EP2747365A1 (en) * 2012-12-21 2014-06-25 British Telecommunications public limited company Network security management
US9244713B1 (en) * 2014-05-13 2016-01-26 Nutanix, Inc. Method and system for sorting and bucketizing alerts in a virtualization environment
CN106789145B (en) * 2016-03-30 2021-04-02 新华三技术有限公司 Alarm information pushing method and device
CN105788194B (en) * 2016-04-08 2018-03-23 北京搜狐新媒体信息技术有限公司 A kind of alarming method by monitoring and device
AU2020278769A1 (en) * 2019-05-22 2022-01-27 Computed Futures, Lcc Systems and methods for detecting and mitigating cyber security threats
CN111127804B (en) * 2019-12-24 2022-05-06 武汉理工光科股份有限公司 Fire-fighting fire grading pushing method and system
CN111105588B (en) * 2019-12-24 2022-03-29 武汉理工光科股份有限公司 Alarm signal merging processing method and system based on fire alarm system

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6393386B1 (en) * 1998-03-26 2002-05-21 Visual Networks Technologies, Inc. Dynamic modeling of complex networks and prediction of impacts of faults therein
US6690274B1 (en) * 1998-05-01 2004-02-10 Invensys Systems, Inc. Alarm analysis tools method and apparatus
DE69817176T2 (en) * 1998-09-09 2004-06-24 International Business Machines Corp. Method and device for intrusion detection in computers and computer networks
US6446058B1 (en) * 1999-04-26 2002-09-03 At&T Corp. Computer platform alarm and control system
AU2001262958A1 (en) * 2000-04-28 2001-11-12 Internet Security Systems, Inc. Method and system for managing computer security information
EP1461927B1 (en) * 2001-10-25 2006-04-12 General Dynamics Government Systems Corporation A method and system for modelling, analysis, and display of network security events

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8055758B2 (en) 2000-07-28 2011-11-08 Axeda Corporation Reporting the state of an apparatus to a remote computer
US8898294B2 (en) 2000-07-28 2014-11-25 Axeda Corporation Reporting the state of an apparatus to a remote computer
US8762497B2 (en) 2000-09-22 2014-06-24 Axeda Corporation Retrieving data from a server
US8108543B2 (en) 2000-09-22 2012-01-31 Axeda Corporation Retrieving data from a server
US7937370B2 (en) 2000-09-22 2011-05-03 Axeda Corporation Retrieving data from a server
US8406119B2 (en) 2001-12-20 2013-03-26 Axeda Acquisition Corporation Adaptive device-initiated polling
US9170902B2 (en) 2001-12-20 2015-10-27 Ptc Inc. Adaptive device-initiated polling
US8752074B2 (en) 2002-04-17 2014-06-10 Axeda Corporation Scripting of soap commands
US8060886B2 (en) 2002-04-17 2011-11-15 Axeda Corporation XML scripting of SOAP commands
US9591065B2 (en) 2002-04-17 2017-03-07 Ptc Inc. Scripting of SOAP commands
US8291039B2 (en) 2003-02-21 2012-10-16 Axeda Corporation Establishing a virtual tunnel between two computer programs
US9002980B2 (en) 2003-02-21 2015-04-07 Axeda Corporation Establishing a virtual tunnel between two computer programs
US7966418B2 (en) 2003-02-21 2011-06-21 Axeda Corporation Establishing a virtual tunnel between two computer programs
US8370479B2 (en) 2006-10-03 2013-02-05 Axeda Acquisition Corporation System and method for dynamically grouping devices based on present device conditions
US8769095B2 (en) 2006-10-03 2014-07-01 Axeda Acquisition Corp. System and method for dynamically grouping devices based on present device conditions
US9491071B2 (en) 2006-10-03 2016-11-08 Ptc Inc. System and method for dynamically grouping devices based on present device conditions
US8065397B2 (en) 2006-12-26 2011-11-22 Axeda Acquisition Corporation Managing configurations of distributed devices
US8788632B2 (en) 2006-12-26 2014-07-22 Axeda Acquisition Corp. Managing configurations of distributed devices
US9491049B2 (en) 2006-12-26 2016-11-08 Ptc Inc. Managing configurations of distributed devices
US8478861B2 (en) 2007-07-06 2013-07-02 Axeda Acquisition Corp. Managing distributed devices with limited connectivity

Also Published As

Publication number Publication date
EP1695485A2 (en) 2006-08-30
ATE358373T1 (en) 2007-04-15
WO2005060160A2 (en) 2005-06-30
DE602004005616T2 (en) 2008-01-24
FR2864392A1 (en) 2005-06-24
PL1695485T3 (en) 2007-08-31
US20070118905A1 (en) 2007-05-24
WO2005060160A3 (en) 2005-09-15
US7506373B2 (en) 2009-03-17
DE602004005616D1 (en) 2007-05-10

Similar Documents

Publication Publication Date Title
EP1695485B1 (en) Method for automatically classifying a set of alarms emitted by sensors for detecting intrusions of a information security system
US10938845B2 (en) Detection of user behavior deviation from defined user groups
Gupta et al. Layered approach using conditional random fields for intrusion detection
US10484413B2 (en) System and a method for detecting anomalous activities in a blockchain network
Elshoush et al. Alert correlation in collaborative intelligent intrusion detection systems—A survey
EP1820170B1 (en) Suppression of false alarms among alarms produced in a monitored information system
WO2004107652A1 (en) Method for the machine learning of frequent chronicles in an alarm log for the monitoring of dynamic systems
FR3076384A1 (en) DETECTION OF ANOMALIES BY A COMBINING APPROACH SUPERVISORY AND NON-SUPERVISE LEARNING
Alserhani Alert correlation and aggregation techniques for reduction of security alerts and detection of multistage attack
Muller Event correlation engine
FR3011416A1 (en) METHOD FOR DETECTING ANOMALIES IN A NETWORK TRAFFIC
FR2902954A1 (en) Entity e.g. web server, inventory storage system for e.g. firewall, has child/terminal nodes linked to parent node by relation so that entity versions and group of versions of child or terminal nodes form part of parent node version group
EP1326374B1 (en) Network management system based on trend analysis
WO2021249629A1 (en) Device and method for monitoring communication networks
WO2010037955A1 (en) Method for characterising entities at the origin of fluctuations in a network traffic
Karthika et al. Dominant features identification for covert nodes in 9/11 attack using their profile
FR3030079A1 (en) MEANS FOR DETERMINING A LEVEL OF RELEVANCE OF A RESOURCE IN AN INFORMATION PROCESSING SYSTEM
Karthika et al. Identifying key players in a covert network using behavioral profile
Sarr et al. Dealing with disappearance of an actor set in social networks
EP3729768A1 (en) Method for automatically constructing computer attack scenarios, computer program product and associated construction system
Naydenova et al. Data Quality: Enterprise Initiatives' Issues and WSN Challenges
Massimo et al. Onion under Microscope: An in-depth analysis of the Tor Web
EP4033361B1 (en) Method and device for determining at least one machine involved in an anomaly detected in a complex computer infrastructure
US12063224B1 (en) Network data interpretation pipeline for recognizing machine operations and activities from network sensor data
WO2006082342A1 (en) Method and system for automatically detecting intrusions

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20060712

AK Designated contracting states

Kind code of ref document: A2

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU MC NL PL PT RO SE SI SK TR

GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

DAX Request for extension of the european patent (deleted)
RIN1 Information on inventor provided before grant (corrected)

Inventor name: TOMBINI, ELVIS

Inventor name: MORIN, BENJAMIN

Inventor name: DEBAR, HERVE

GRAS Grant fee paid

Free format text: ORIGINAL CODE: EPIDOSNIGR3

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE PATENT HAS BEEN GRANTED

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU MC NL PL PT RO SE SI SK TR

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: NL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20070328

Ref country code: SI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20070328

Ref country code: AT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20070328

Ref country code: FI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20070328

REG Reference to a national code

Ref country code: GB

Ref legal event code: FG4D

Free format text: NOT ENGLISH

RIN1 Information on inventor provided before grant (corrected)

Inventor name: DEBAR, HERVE

Inventor name: TOMBINI, ELVIS

Inventor name: MORIN, BENJAMIN

REG Reference to a national code

Ref country code: CH

Ref legal event code: EP

REF Corresponds to:

Ref document number: 602004005616

Country of ref document: DE

Date of ref document: 20070510

Kind code of ref document: P

REG Reference to a national code

Ref country code: IE

Ref legal event code: FG4D

Free format text: LANGUAGE OF EP DOCUMENT: FRENCH

GBT Gb: translation of ep patent filed (gb section 77(6)(a)/1977)

Effective date: 20070606

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20070628

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: ES

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20070709

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20070728

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: PT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20070828

REG Reference to a national code

Ref country code: PL

Ref legal event code: T3

NLV1 Nl: lapsed or annulled due to failure to fulfill the requirements of art. 29p and 29m of the patents act
PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20070328

REG Reference to a national code

Ref country code: IE

Ref legal event code: FD4D

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: RO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20070328

Ref country code: CZ

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20070328

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20070328

Ref country code: DK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20070328

PLBE No opposition filed within time limit

Free format text: ORIGINAL CODE: 0009261

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20070328

26N No opposition filed

Effective date: 20080102

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20070328

Ref country code: GR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20070629

BERE Be: lapsed

Owner name: FRANCE TELECOM

Effective date: 20071231

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MC

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20071231

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: BE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20071231

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: EE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20070328

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: CY

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20070328

REG Reference to a national code

Ref country code: CH

Ref legal event code: PL

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: BG

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20070628

Ref country code: LU

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20071216

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: TR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20070328

Ref country code: HU

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20070929

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LI

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20081231

Ref country code: CH

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20081231

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: PL

Payment date: 20101209

Year of fee payment: 7

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: GB

Payment date: 20101201

Year of fee payment: 7

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: DE

Payment date: 20101208

Year of fee payment: 7

Ref country code: FR

Payment date: 20110120

Year of fee payment: 7

GBPC Gb: european patent ceased through non-payment of renewal fee

Effective date: 20111216

REG Reference to a national code

Ref country code: FR

Ref legal event code: ST

Effective date: 20120831

REG Reference to a national code

Ref country code: DE

Ref legal event code: R119

Ref document number: 602004005616

Country of ref document: DE

Effective date: 20120703

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: DE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20120703

Ref country code: GB

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20111216

REG Reference to a national code

Ref country code: PL

Ref legal event code: LAPE

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: FR

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20120102

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: PL

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20111216